Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.
☆121Aug 18, 2020Updated 5 years ago
Alternatives and similar repositories for DomainTrustExplorer
Users that are interested in DomainTrustExplorer are comparing it to the libraries listed below
Sorting:
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆103Dec 7, 2023Updated 2 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆47Jun 5, 2017Updated 8 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- A JavaScript and VBScript Based Empire Launcher, which runs within their own embedded PowerShell Host.☆321Jun 5, 2017Updated 8 years ago
- PowerShell Scripts I find useful☆776May 18, 2016Updated 9 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Domain user enumeration tool☆216Nov 2, 2023Updated 2 years ago
- PowerShell Scripts focused on Post-Exploitation Capabilities☆319Dec 29, 2017Updated 8 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- ☆182Feb 21, 2022Updated 4 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- PowerAvails is a unit of collection of Powershell modules that help you get done many things☆118May 31, 2019Updated 6 years ago
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆307Jul 3, 2020Updated 5 years ago
- ☆164Aug 28, 2015Updated 10 years ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- A Bring Your Own Land Toolkit that Doubles as a WMI Provider☆289Oct 31, 2018Updated 7 years ago
- Powershell MS Outlook enumeration and phishing tool☆77May 26, 2016Updated 9 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- ☆78May 24, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- ☆264Jul 15, 2022Updated 3 years ago
- Generates anti-sandbox analysis HTA files without payloads☆121Mar 16, 2017Updated 9 years ago
- Powershell C2 Server and Implants☆575Nov 11, 2019Updated 6 years ago
- The Outlook HTML Leak Test Project☆130May 12, 2018Updated 7 years ago
- Project that retrieves crackable hashes from KRB5 AS-REP responses for users without kerberoast preauthentication enabled.☆208Sep 25, 2018Updated 7 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆527Apr 14, 2023Updated 2 years ago
- Lateral Movement technique using DCOM and HTA☆235Oct 18, 2022Updated 3 years ago
- Detect and abuse risky SPNs☆266Jun 15, 2017Updated 8 years ago
- Exports Kerberos KrbCred Tickets for use in Mimikatz/Beacon from a Kerberos CCache File☆89Jul 22, 2015Updated 10 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆453Apr 22, 2016Updated 9 years ago
- Cheat sheets for various projects.☆1,086Oct 16, 2017Updated 8 years ago
- Python tool to inject fake updates into unencrypted WSUS traffic☆113Oct 23, 2015Updated 10 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- ☆210Jan 30, 2019Updated 7 years ago